For some reason the 1990's network security has been lost with this comment.
Strangely, if code I wrote is allowing someone else to abuse my product, then I am at fault for allowing such abuse. How hard is it for anyone to understand?
For some reason the 1990's network security has been lost with this comment.
Strangely, if code I wrote is allowing someone else to abuse my product, then I am at fault for allowing such abuse. How hard is it for anyone to understand?